HacKer

Chapter 1579: is like a cloud! [You are accompanied by the Spring Festival! 】

Hacker Alliance, the core layer of encrypted voice communication channels.

The Panther puts the information in the first assessment server and sends it to the chat interface of the encrypted voice communication channel, which is viewed by others in the core layer of the hacker alliance.

When the members of the core layer of the hacker alliance watched the treatment of the peripheral organization members proposed by h, they did not speak.

Even the black wolf’s heart has raised some thoughts!

‘I’m going to his grand watermelon, one hundred thousand dollars a month! Wasn't that year worth $1.2 million? Close to 10 million Xia Guoyuan? Black wolves only think that a small heart is accelerating the frequency of beating.

During this journey, the exchange rate between Xia Guoyuan and the US dollar was relatively stable, and it remained at a high of one to eight. Xia Guo withstood the pressure of Li Jianguo and insisted that Xia Guoyuan not appreciate.

Therefore, 1.2 million US dollars, converted into Xia Guoyuan, a full 9.6 million Xia Guoyuan, almost close to 10 million.

This is an astronomical number!

The hacker alliance is Xia’s most well-known hacker organization, but the hacker alliance’s profitability is not high. They are closely watched by the state, and major security companies are also staring at them. Even if they want to get any windfall, there is no possibility. .

There are not many profitable projects in the hacker alliance. The most fundamental and fundamental ones are the network security tests invited by major security companies and state agencies. To put it simply, it is to pay for the hacker alliance to attack the security company or the network system developed by the state agency to find possible security vulnerabilities and fix it.

Second, the hacker alliance controls a number of websites, helps ad networks sell ads, and also gets some profit sharing. In addition to these two stable profit items. There are also some gray projects, but those gray projects have very little income and can cause trouble. and so. If not necessary, or when the attraction is not enough. The hacker alliance rarely takes the initiative of the gray project business.

In 2007, the core management of the hacker alliance was divided into one year's profits, and each person received almost three million Xia Guoyuan.

‘It’s also a peripheral organization, and I will go to the black watch’s assessment for a while! The black wolf made a decision in his heart.

In the encrypted voice communication channel of the core layer of the hacker alliance, the black knife coughed a few times. "What do you think about the treatment of the peripheral members of the black watch organization?"

The Panthers answered first. "This black watch organization has absolutely conspiracy! Moreover, there is definitely a strong consortium behind them! They are not pure hackers! If it is a simple hacker organization, like us, how can they have such huge financial resources? ?"

The Black Tiger of the Alliance II is curious: "The third child, aren't you saying that the black watch has the world's top hacker? Do you say that they have the possibility to make money through hacking?"

"Impossible!" The Panther directly denied it!

The black knife also denied the problem of the black tiger. "Tiger, you think too much, even if they have the world's top hackers. Is there no government department? The government has more resources, even the top hackers. Nor will it be against the government in the financial system."

The last richest family is black. Weakly questioned: "Black knife boss, how should we treat black watches? This organization does not know which country it is. They seem to recruit members of peripheral organizations around the world."

The black knife laughed. "It's very simple. Let's take a black watch!"

"What?" The black heart was surprised and thought that he had got it wrong. "Black knife boss, what are you talking about?"

The black knife was repeated once. "We participate in the black watch! Since the black watch is so generous, why don't we appreciate it? It is just a member of the peripheral organization!"

The decision made for the black knife. The black wolf almost screamed and celebrated, but the black wolf suppressed his thoughts. Instead, I was worried: "Boss, in case the other party knows our identity?"

"So you have to be careful! We have joined the black watch for two purposes. The main purpose is to investigate the bottom of the black watch and see what the purpose of this black watch is, and what kind of organization it belongs to. For secondary purposes, we can Get some subsidies from the black watch, we should thank the black watch!” The black knife laughed.

Others laughed with the black knife. The idea of ​​the core layer of the hacker alliance is very good, that is, let the h people have money.

But is this possible?

"Okay, brothers, let's start the black watch assessment! I hope that each of us will at least be qualified as a member of the ex-excellent level of peripheral organization." Black Knife made a summary.

"Understand!" The black wolf is repressed with excitement, and the goal of the black wolf is le legend!

Hackers around the world, whether organized or unorganized free hackers, who have obtained the test qualifiers, almost 90% of the proportion, chose to invest in the assessment.

h established the assessment mechanism, can be described as an instant like a cloud!

Shuangqing City, Zhongyu District, the secret underground base of the first-level branch of Longteng Plan.

Shi Lei three people look at the current situation through the virtual transparent screen of the lip lens type information processor.

Rafael laughed. "Jazz, look, there are more than 3,000 people who are currently participating in our assessment!"

Tao Wenxian smiled and said: "Yes! The welfare of the members of the peripheral organizations we provide is very good and must attract many people to join us."

Shi Lei smiled and said: "You two, pay attention to help the clothes, and take a good look at the people involved in the assessment. Once the clothes are not able to identify the identity, you have to help judge."

The assessment mechanism of h is the trap of Shi Lei design!

Shi Lei borrowed the resources of iwn secret network to construct an assessment mechanism, and collected hacker information for participating in the assessment through server hacker attack and defense. Then, through the characteristics of these hacker attack plans and defensive programs, judge the identity of the other party on the Internet, rather than the true identity.

For example, the black wolf of the hacker league, his attack mode has its own characteristics, as long as this feature is in Raphael's database, Rafael can judge the black wolf's Internet identity, and the hacker alliance is the fourth black wolf.

Although it is only the identity of the Internet, not the real identity, this information is also very important for Shi Lei. At least they judged it. The hackers involved in the assessment are hackers of other organizations or real free hackers.

"Okay, stone brother!" Tao Wenxian affirmed.

Raphael also replied: "No problem! However, I am basically not familiar with the hackers in Xiaguo. I am not familiar with the low-end hackers."

This answer is a bit arrogant, but in fact it is!

Rafael is the world's top hacker. Usually, Raphael will not pay attention to low-end hackers, because there is no need for it! Just as humans don't need to think about the idea of ​​ants!

The gap between the world's peak hackers and ordinary hackers is really huge!

Shi Lei nodded and made an ok gesture to them. Shi Lei himself has a more important task. Shi Lei needs to pay attention to the assessment system. Is there any hidden security expert?

If it is said that the top security experts have mixed into the peripheral organization of h, it is not a fun thing, and it is said that they may not cause a lot of trouble for Shi Lei.

In a quiet room, there is no light other than the light on the computer screen. In front of the computer screen, sitting on a man with a beard, this man is a black wolf in the hacker league.

I saw the line of source code information on the computer screen. The black wolf's hands tapped on the keyboard quickly, and the eyes focused on the computer screen.

"Hey? Strange!" The black wolf has completed the first test. He is in the first test server, looking for the second test link ip address.

If you can't find the ip address of this link, you can't find the server for the second test. What about the second test and win?

The black wolf frowned at the computer screen. He had searched the entire first assessment server, but did not find any link information and no suspicious information.

"It's impossible not! Somewhere must be hidden!" The black wolf whispered, then manually started the server in the first test, looking for the link information of the second evaluation server.

After some searching, the black wolf found a suspicious folder, which contained some photos. You know, this is not a personal computer, but a server for assessment. In the assessment server, it is unscientific to store some photos.

The black wolf opened the pictures and found that the pictures were all monochrome images, as if they were meaningless, or just some useless information.

Just as the black wolf was ready to let go of these pictures, there was a flash of light in the mind of the black wolf, and he muttered again in his mouth.

"This is **** color conversion and hexadecimal judgment!" The black wolf will correspond to the color of the English word, entered in the computer.

When the twelve words are entered, even if no color conversion and hexadecimal judgment are used, the black wolf reads the link address of the second evaluation server!

"Ha ha ha, this uncle is really smart!" The black wolf got the link address of the second evaluation server, suddenly laughed.

Shi Lei has not yet paid attention to the situation of the old enemy of the black wolf. Shi Lei is observing an assessment object, and there is a somewhat strange assessment object!

(To be continued)

Ps:?

...

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like